{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:01:04Z","timestamp":1725620464106},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642248603"},{"type":"electronic","value":"9783642248610"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24861-0_23","type":"book-chapter","created":{"date-parts":[[2011,10,11]],"date-time":"2011-10-11T21:18:10Z","timestamp":1318367890000},"page":"341-354","source":"Crossref","is-referenced-by-count":3,"title":["Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Haifeng","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Xiangxue","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","first-page":"245","volume-title":"Eighth ACM Conference on Computer and Communications Security","author":"S. Micali","year":"2001","unstructured":"Micali, S., Ohta, K., Reyzin, L.: Accountable-Subgroup Multisignatures: Extended Abstract. In: Eighth ACM Conference on Computer and Communications Security, pp. 245\u2013254. ACM Press, New York (2001)"},{"key":"23_CR2","first-page":"390","volume-title":"13th ACM Conference on Computer and Communications Security","author":"M. Bellare","year":"2006","unstructured":"Bellare, M., Neven, G.: Multisignatures in the Plain Public-Key Model and a General Forking Lemma. In: 13th ACM Conference on Computer and Communications Security, pp. 390\u2013399. ACM Press, New York (2006)"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-36288-6_3","volume-title":"Public Key Cryptography - PKC 2003","author":"A. Boldyreva","year":"2002","unstructured":"Boldyreva, A.: Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 31\u201346. Springer, Heidelberg (2002)"},{"key":"23_CR4","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/MOBIQUITOUS.2005.54","volume-title":"Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","author":"J. Kim","year":"2005","unstructured":"Kim, J., Tsudik, G.: Srdp: Securing Route Discovery in DSR. In: Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 247\u2013260. IEEE Press, Los Alamitos (2005)"},{"key":"23_CR5","first-page":"449","volume-title":"The 15th ACM Conference on Computer and Communications Security","author":"A. Bagherzandi","year":"2008","unstructured":"Bagherzandi, A., Cheon, J., Jarecki, S.: Multisignatures Secure under the Discrete Logarithm Assumption and a Generalized Forking Lemma. In: The 15th ACM Conference on Computer and Communications Security, pp. 449\u2013458. ACM Press, New York (2008)"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-540-85855-3_15","volume-title":"Security and Cryptography for Networks","author":"A. Bagherzandi","year":"2008","unstructured":"Bagherzandi, A., Jarecki, S.: Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol.\u00a05229, pp. 218\u2013235. Springer, Heidelberg (2008)"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1016\/j.comnet.2005.09.021","volume":"50","author":"C. Castelluccia","year":"2006","unstructured":"Castelluccia, C., Jarecki, S., Kim, J., Tsudik, G.: Secure Acknowledgment Aggregation and Multisignatures with Limited Robustness. Comput. Netw.\u00a050, 1639\u20131652 (2006)","journal-title":"Comput. Netw."},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X. Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P.H., Shen, X.: Gsis: A Secure and Privacy Preserving Protocol for Vehicular Communications. IEEE Trans. on Vehicular Tech.\u00a056, 3442\u20133456 (2007)","journal-title":"IEEE Trans. on Vehicular Tech."},{"key":"23_CR9","first-page":"14","volume-title":"The 27th Conference on Computer Communications IEEE INFOCOM 2008","author":"R. Lu","year":"2008","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: Ecpp: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. In: The 27th Conference on Computer Communications IEEE INFOCOM 2008, pp. 14\u201318. IEEE Press, Los Alamitos (2008)"},{"key":"23_CR10","first-page":"14","volume-title":"The 29th Conference on Computer Communications, IEEE INFOCOM 2010","author":"R. Lu","year":"2010","unstructured":"Lu, R., Lin, X., Shen, X.: Spring: A social-based Privacy-Preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. In: The 29th Conference on Computer Communications, IEEE INFOCOM 2010, pp. 14\u201319. IEEE Press, Los Alamitos (2010)"},{"key":"23_CR11","first-page":"1","volume":"71","author":"K. Itakura","year":"1983","unstructured":"Itakura, K., Nakamura, K.: A Public Key Cryptosystem Suitable for Digital Multisignatures. NEC Research & Development\u00a071, 1\u20138 (1983)","journal-title":"NEC Research & Development"},{"key":"23_CR12","first-page":"21","volume":"E82-A","author":"K. Ohta","year":"1999","unstructured":"Ohta, K., Okamoto, R.: Multisignature Schemes Secure Against Active Insider Attacks. IEICE Transactions on Fundamentals\u00a0E82-A, 21\u201331 (1999)","journal-title":"IEICE Transactions on Fundamentals"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/11761679_28","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"S. Lu","year":"2006","unstructured":"Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential Aggregate Signatures and Multisignatures Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 465\u2013485. Springer, Heidelberg (2006)"},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-540-72540-4_13","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"T. Ristenpart","year":"2007","unstructured":"Ristenpart, T., Yilek, S.: The Power of Proofs-of-Possession: Securing Multiparty Signatures Against Rogue-Key Attacks. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 228\u2013245. Springer, Heidelberg (2007)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Adams, C., Farrell, S., Kause, T., Monen, T.: Internet X.509 Public Key Infrastructure Certificate Management Protocol, cmp (2005)","DOI":"10.17487\/rfc4210"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Schaad, J.: Internet X.509 Public Key Infrastructure Certificate Request Message Format (2005)","DOI":"10.17487\/rfc4211"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10623-009-9313-z","volume":"54","author":"C. Ma","year":"2010","unstructured":"Ma, C., Weng, J., Li, Y., Deng, R.: Efficient Discrete Logarithm Based Multi-Signature Scheme in the Plain Public Key Model. Des. Codes Cryptography\u00a054, 121\u2013133 (2010)","journal-title":"Des. Codes Cryptography"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 416\u2013432. Springer, Heidelberg (2003)"},{"key":"23_CR19","first-page":"62","volume-title":"10th ACM Conference on Computer and Communications Security","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols. In: 10th ACM Conference on Computer and Communications Security, pp. 62\u201373. ACM Press, New York (1993)"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-73420-8_37","volume-title":"Automata, Languages and Programming","author":"M. Bellare","year":"2007","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Unrestricted Aggregate Signatures. In: Arge, L., Cachin, C., Jurdzi\u0144ski, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol.\u00a04596, pp. 411\u2013422. Springer, Heidelberg (2007)"},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1145\/1151690.1151692","volume":"24","author":"K. Barr","year":"2006","unstructured":"Barr, K., Asanovi\u0107, K.: Energy-Aware Lossless Data Compression. ACM Trans. Comput. Syst.\u00a024, 250\u2013291 (2006)","journal-title":"ACM Trans. Comput. Syst."},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.ipl.2010.10.015","volume":"111","author":"H. Qian","year":"2010","unstructured":"Qian, H., Xu, S.: Non-Interactive Multisignatures in the Plain Public-Key Model with Efficient Verification. Inf. Process. Lett.\u00a0111, 82\u201389 (2010)","journal-title":"Inf. Process. Lett."},{"key":"23_CR23","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal of Computing\u00a017, 281\u2013308 (1988)","journal-title":"SIAM Journal of Computing"},{"key":"23_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"23_CR25","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","volume":"156","author":"S. Galbraith","year":"2008","unstructured":"Galbraith, S., Paterson, K., Smart, N.: Pairings for Cryptographers. Discrete Applied Mathematics\u00a0156, 3113\u20133121 (2008)","journal-title":"Discrete Applied Mathematics"},{"key":"23_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-540-24676-3_5","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"A. Lysyanskaya","year":"2004","unstructured":"Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential Aggregate Signatures from Trapdoor Permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 74\u201390. Springer, Heidelberg (2004)"},{"key":"23_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-540-78967-3_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"G. Neven","year":"2008","unstructured":"Neven, G.: Efficient Sequential Aggregate Signed Data. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 52\u201369. Springer, Heidelberg (2008)"},{"key":"23_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/11745853_17","volume-title":"Public Key Cryptography - PKC 2006","author":"C. Gentry","year":"2006","unstructured":"Gentry, C., Ramzan, Z.: Identity-Based Aggregate Signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 257\u2013273. Springer, Heidelberg (2006)"},{"key":"23_CR29","first-page":"473","volume-title":"17th ACM Conference on Computer and Communications Security","author":"J.H. Ahn","year":"2010","unstructured":"Ahn, J.H., Green, M., Hohenberger, S.: Synchronized Aggregate Signatures: New Definitions, Constructions and Applications. In: 17th ACM Conference on Computer and Communications Security, pp. 473\u2013484. ACM Press, New York (2010)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24861-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T06:07:08Z","timestamp":1560751628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24861-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642248603","9783642248610"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24861-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}